|
|
Showing 1 - 2 of
2 matches in All Departments
|
Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
|
R1,154
Discovery Miles 11 540
|
Ships in 10 - 15 working days
|
Kismet is the industry standard for examining wireless network
traffic, and is used by over 250,000 security professionals,
wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in
recent years that geared towards Windows users, Kismet Hacking is
geared to those individuals that use the Linux operating system.
People who use Linux and want to use wireless tools need to use
Kismet. Now with the introduction of Kismet NewCore, they have a
book that will answer all their questions about using this great
tool. This book continues in the successful vein of books for
wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
Seven Deadliest Wireless Technologies Attacks provides a
comprehensive view of the seven different attacks against popular
wireless protocols and systems. This book pinpoints the most
dangerous hacks and exploits specific to wireless technologies,
laying out the anatomy of these attacks, including how to make your
system more secure. You will discover the best ways to defend
against these vicious hacks with step-by-step instruction and learn
techniques to make your computer and network impenetrable. Each
chapter includes an example real attack scenario, an analysis of
the attack, and methods for mitigating the attack. Common themes
will emerge throughout the book, but each wireless technology has
its own unique quirks that make it useful to attackers in different
ways, making understanding all of them important to overall
security as rarely is just one wireless technology in use at a home
or office. The book contains seven chapters that cover the
following: infrastructure attacks, client attacks, Bluetooth
attacks, RFID attacks; and attacks on analog wireless devices, cell
phones, PDAs, and other hybrid devices. A chapter deals with the
problem of bad encryption. It demonstrates how something that was
supposed to protect communications can end up providing less
security than advertised. This book is intended for information
security professionals of all levels, as well as wireless device
developers and recreational hackers.
|
You may like...
Let's Rock
The Black Keys
CD
R229
Discovery Miles 2 290
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.